Predicting network attack patterns in SDN using machine learning approach
An experimental setup of 32 honeypots reported 17M login attempts originating from 112
different countries and over 6000 distinct source IP addresses. Due to decoupled control …
different countries and over 6000 distinct source IP addresses. Due to decoupled control …
[PDF][PDF] NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces.
Network protocol reverse engineering is an important challenge with many security
applications. A popular kind of method leverages network message traces. These methods …
applications. A popular kind of method leverages network message traces. These methods …
Leveraging machine learning approach to setup software-defined network (SDN) controller rules during DDoS attack
A machine learning based Distributed Denial of Service (DDoS) attack detection system,
implemented in a virtual SDN environment testbed, has been presented in this paper. This …
implemented in a virtual SDN environment testbed, has been presented in this paper. This …
Diversify to survive: Making passwords stronger with adaptive policies
SM Segreti, W Melicher, S Komanduri… - … symposium on usable …, 2017 - usenix.org
Password-composition policies are intended to increase resistance to guessing attacks by
requiring certain features (eg, a minimum length and the inclusion of a digit). Sadly, they …
requiring certain features (eg, a minimum length and the inclusion of a digit). Sadly, they …
Graph clustering and anomaly detection of access control log for forensic purposes
Attacks on operating system access control have become a significant and increasingly
common problem. This type of security threat is recorded in a forensic artifact such as an …
common problem. This type of security threat is recorded in a forensic artifact such as an …
Where The Wild Things Are:{Brute-Force}{SSH} Attacks In The Wild And How To Stop Them
SK Singh, S Gautam, C Cartier, S Patil… - 21st USENIX Symposium …, 2024 - usenix.org
SSH (Secure Shell) is widely used for remote access to systems and cloud services. This
access comes with the persistent threat of SSH password-guessing brute-force attacks …
access comes with the persistent threat of SSH password-guessing brute-force attacks …
ProsegDL: Binary protocol format extraction by deep learning-based field boundary identification
S Zhao, J Wang, S Yang, Y Zeng… - 2022 IEEE 30th …, 2022 - ieeexplore.ieee.org
Protocol reverse engineering can be applied to various security applications, including
fuzzing, malware analysis, and intrusion detection. It aims to acquire an unknown protocol's …
fuzzing, malware analysis, and intrusion detection. It aims to acquire an unknown protocol's …
An exploration of graphical password authentication for children
H Assal, A Imran, S Chiasson - International Journal of Child-Computer …, 2018 - Elsevier
In this paper, we explore graphical passwords as a child-friendly alternative for user
authentication. We evaluate the usability of three variants of the PassTiles graphical …
authentication. We evaluate the usability of three variants of the PassTiles graphical …
Refined detection of SSH brute-force attackers using machine learning
This paper presents a novel approach to detect SSH brute-force (BF) attacks in high-speed
networks. Contrary to host-based approaches, we focus on network traffic analysis to identify …
networks. Contrary to host-based approaches, we focus on network traffic analysis to identify …
Honeynet data analysis and distributed SSH brute-force attacks
Due to the increase in the number of network attacks, it has become essential to gain deeper
insight into the malicious activities carried out by the attackers. In this paper, the authors …
insight into the malicious activities carried out by the attackers. In this paper, the authors …